Course Overview
Certified Ethical Hacker (CEH) is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system.CEH Exam is designed to test and certify the readiness of an applicant to perform security assessments. It is designed, maintained and administered by the EC-Council and is designed to be taken by applicants early in their career in information security.
Reasons for Choosing KeyTrace Cyber Assurance CEH Program
KeyTrace Cyber Assurance offers a unique model of training delivery for its cyber security programs.We are different than other run of the mill vendors when it comes to delivering any of the training courses.We also offer a free one day workshop every week to all participants.
Training Participants have the following benefits when it comes to training with us.
- Free Foundation Classes for CEH followed by Live Training CEH Workshops.
- Recorded Sessions Available To All Participants.
- Continual Support to Participants Post Training.
- Free One Day CEH Workshop Every Week.
- Pre & Post Training CEH Assessments Questions.
- Complementary Workshops provided to participants post the completion of training program to help participants crack the CEH exam.
Course Benefits
Mentioned below are relevant benefits for going through CEH certification
- CEH is a worldwide recognized certification and serves as an evidence of competency of a candidate’s ethical hacking knowledge and pentesting skills.
- CEH certification provides excellent career prospects and professional growth.
- There is an increase in the job opportunities for ethical hackers, and the industry is estimated to grow exponentially over the next 10 years due to the data surge.
- CEH certification opens multiple career avenues and opportunities for participants including roles as Security Analyst, Application Security Consultant, Incident Responder and Ethical Hacker.
Target Audience
CEH certification is designed for IT professionals with experience in cyber security industry. CEH participants usually cater to any of the following job roles.
- Information Security Analyst / Administrator
- Information Security Officer
- Information Security Manager / Specialist
- Information Systems Security Engineer
- Information Security Professional
- IT Auditor
- Risk/Threat/Vulnerability Analyst
- System Administrators
- Network Administrator
- Network Engineer
Course Duration
Training Duration for Live CEH course is 40 Hours.
Course Fees
CEH course fee Per Participant is INR 14000 + 18 % GST.Discount Prices are available on first come first serve basis.For any of the female participants we offer a straight 10% discount in pricing.
Frequently Asked Questions
In order to be considered for the credential, candidates need to have at least two years of work experience in the information security domain. To prove knowledge, they can attend an official EC-Council training either at an accredited training center or at an approved academic institution. As an alternative, candidates can go through an eligibility application process that entails the payment of a non-refundable $100 fee and the submission of a form. If the application is approved, the candidate has three months to purchase the test voucher from EC-Council online store or one of their authorized channels.
The CEH was the first certification to bring “black hat” hacking techniques to a mainstream audience of IT professionals thereby providing the knowledge needed to properly prevent and respond to cyber criminal techniques.Because of the popularity of this certification, thousands of professionals across the world are aiming to achieve it. If you are considering the CEH too, you will want to know the benefits before you invest your time and money.CEH teaches you the offensive hacking skills but from a ethical hacker’s mindset and thus by understanding the attacker’s mindset you are poised to help your organization by providing the required security recommendations for improving the organization’s security posture.
CEH exam is an intermediate level exam and provides extensive coverage of the subject matter of ethical hacking.Passing score for CEH exam is 70%.CEH exam can be considered to be of moderate level of difficulty and with the right approach and preparation a CEH aspirant can pass the exam with flying colours.
CEH exam is conducted in English language and it is a computer based test and the exam duration is 240 minutes and the exam pattern is based on multiple choice answers for every exam question.There are a total of approximately 125 questions tested in the CEH exam.CEH computer based exam is conducted at Pearson Vue assigned testing centres worldwide.For experienced professionals who are pursuing CEH exam without taking training need to pay an application fees of 100 USD.Cost of an EC-Council exam voucher is 950 USD.
KeyTrace Cyber Assurance helps participants by conducting live training sessions over Zoom and other available video communications software.KeyTrace also helps participants by conducting pre and post assessment questions at the end of each chapter.This keeps the audience engaged during the training sessions.As a part of our commitment we also regularly conduct complementary workshops post completion of training programs to further help our participants crack the CEH exam.Practice exam question sets are also provided to participants to help them crack the CEH certification.
CEH Syllabus
Domain 1 : Introduction To Ethical Hacking
- Overview of Current Security Trends
- Understanding Elements of Information Security
- Understanding Information Security Threats and Attack Vectors
- Overview of hacking concepts, types, and phases
- Understanding ethical hacking concepts and scope
- Overview of information security management and defense-in-depth
- Overview of policies, procedures, and awareness
- Overview of physical security and controls
- Understanding incidence management process
- Overview of vulnerability assessment and penetration testing
- Overview of information security acts and laws
Domain 2 : Footprinting And Reconnaissance
- Understanding footprinting concepts
- Footprinting through search engines
- Footprint using advance google hacking techniques
- Footprint through social networking sites
- Understanding different techniques for website footprinting
- Understanding different techniques for email footprinting
- Understanding different techniques of competitive intelligence
- Understanding different techniques for WHO IS footprinting
- Understanding different techniques for network footprinting
- Understanding different techniques of footprinting through social engineering
- Footprinting tools
- Footprinting countermeasures
- Overview of footprinting Pen Testing
Domain 3 : Scanning Networks
- Overview of networking scanning
- Understanding different techniques to check for Live Systems
- Understanding different techniques to check for Open Ports
- Understanding various scanning techniques
- Understanding various IDS Evasion Techniques
- Understanding banner grabbing
- Overview of Vulnerability scanning
- Drawing network diagrams
- Using Proxies and Anonymizer for attack
- Understanding IP Spoofing and various detection techniques
- Overview of scanning and Pen Testing
Domain 4 : Enumeration
- Enumeration
- Understanding different techniques for NetBIOS Enumeration
- Understanding different techniques for SNMP enumeration
- Understanding different techniques for LDAP enumeration
- Understanding different techniques for NTP enumeration
- Understanding different techniques for SMTP and DNS enumeration countermeasures
- Overview of enumeration pen testing
Domain 5 : Vulnerability Analysis
- Vulnerability of the management life cycle
- Understanding various approaches to vulnerability analysis
- Tools used to perform the vulnerability assessments
- Vulnerability analysis tools and techniques
Domain 6 : System Hacking
- Overview of CEH Hacking Methodology
- Understanding different techniques to gain access to the system
- Understanding privilege escalation techniques
- Understanding different techniques to create and maintain remote access to the system
- Overview of different types of Rootkits
- Overview of Steganograpy and Steganalysis
- Understanding techniques to hide the evidence of compromise
- Overview of system hacking penetration testing
Domain 7 : Malware Threats
- Introduction to malware and malware propagation techniques
- Overview of Trojans, their types, and how to infect systems
- Overview of viruses, their types, and how they infect files
- Introduction to computer worm
- Understanding the Malware Analysis Process
- Understanding different techniques to detect malware
- Malware countermeasures
- Overview of Malware penetration testing
Domain 8 : Sniffing
- Overview of sniffing concepts
- Understanding MAC attacks
- Understanding DHCP attacks
- Understanding ARP Poisoning
- Understanding MAC Spoofing attacks
- Understanding DNS poisoning
- Sniffing tools
- Sniffing countermeasures
- Understanding various techniques to detect sniffing
- Overview of sniffing Pen Testing
5>Domain 9 : Social Engineering
- Overview of social engineering
- Understanding various social engineering techniques
- Understanding insider threats
- Understanding impersonation on social networking sites
- Understanding identity theft
- Social engineering countermeasures
- Identify theft countermeasures
- Overview of Social Engineering Pen Testing
Domain 10 : Denial-Of-Service
- Overview of Denial of Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
- Overview different DoS/DDoS) attack techniques
- Understanding the botnet network
- Understanding various DoS and DDoS Attack Tools
- DoS/DDoS Countermeasures
- Overview of DoS Attack Penetration Testing
Domain 11 : Session Hijacking
- Understanding session hijacking concepts
- Understanding application level session hijacking
- Understanding network level session hijacking
- Session hijacking tools
- Session hijacking countermeasures
- Overview of session hijacking penetration testing
Domain 12 : Evading IDS, Firewalls, And Honeypots
- Understanding IDS, Firewall, and honeypot concepts
- IDS, Firewall and honeypot solutions
- Understanding different techniques to bypass IDS
- Understanding different techniques to bypass firewalls
- IDS/Firewall evading tools
- Understanding different techniques to detect honeypots
- IDS/Firewall evasion countermeasures
- Overview of IDS and firewall Penetration Testing
Domain 13 : Hacking Web Servers
- Understanding webserver concepts
- Understanding webserver attacks
- Understanding webserver attack methodology
- Webserver attack tools
- Countermeasures against webserver attacks
- Overview of Patch Manageme
- Webserver security tools
- Overview of Webserver penetration testing
Domain 14 : Hacking Web Applications
- Understanding web application concepts
- Understanding web application threats
- Understanding web application hacking methodology
- Web application hacking tools
- Understanding web application countermeasures
- Web application security tools
- Overview of web application penetration testing
Domain 15 : SQL Injection
- Understanding SQL injection concepts
- Understanding various types of SQL injection attacks
- Understanding SQL injection methodology
- SQL injection tools
- Understanding different IDS evasion techniques
- SQL injection countermeasures
- SQL injection detection tools
Domain 16 : Hacking Wireless Networks
- Understanding wireless concepts
- Understanding wireless encryption algorithms
- Understanding wireless threats
- Understanding wireless hacking methodology
- Wireless hacking tools
- Understanding Bluetooth hacking techniques
- Understanding wireless hacking countermeasures
- Wireless security tools
- Overview of wireless penetration testing
Domain 17 : Hacking Mobile Platforms
- Understanding mobile attack platform vectors
- Understanding various android threat and attacks
- Understanding various iOS threats and attacks
- Understanding various Windows Phone OS threats and attacks
- Understanding various blackberry threats and attacks
- Understanding mobile device management (MDM)
- Mobile Security Guidelines and security tools
- Overview of Mobile Penetration Testing
Domain 18 : IOT Hacking
- Understanding IoT concepts
- Cryptography tools
- Understanding various IoT threats and attacks
- Understanding IoT Hacking
- Understanding IoT attacks
- IoT security Tools
Domain 19 : Cloud Computing
- Understanding Cloud Computing Concepts
- Understanding Cloud Computing Threats
- Understanding Cloud Computing Attacks
- Understanding Cloud Computing Security
- Cloud computing Security tools
- Overview of Cloud Penetration testing
Domain 20 : Cryptography
- Understanding Cryptography concepts
- Understanding Cryptography concepts
- Cryptography tools
- Understanding Public Key Infrastructure (PKI)
- Understanding email encryption
- Understanding disk encryption
- Understanding Cryptography attacks
- Cryptanalysis Tools
Reasons for Choosing KeyTrace Cyber Assurance CEH Program
KeyTrace Cyber Assurance offers a unique model of training delivery for its cyber security programs.We are different than other run of the mill vendors when it comes to delivering any of the training courses.We also offer a free one day workshop every week to all participants.
Training Participants have the following benefits when it comes to training with us.
- Free Foundation Classes for CEH followed by Live Training CEH Workshops.
- Recorded Sessions Available To All Participants.
- Continual Support to Participants Post Training.
- Continual Support to Participants Post Training.
- Free One Day CEH Workshop Every Week.
- Pre & Post Training CEH Assessment Questions.
- Complementary Workshops provided to participants post the completion of training program to help participants crack the CEH exam.
Training Duration for Live CEH course is 40 Hours.
CEH certification is designed for IT professionals with experience in cyber security industry. CEH participants usually cater to any of the following job roles.
- Information Security Analyst / Administrator
- Information Security Officer
- Information Security Manager / Specialist
- Information Systems Security Engineer
- Information Security Professional
- IT Auditor
- Risk/Threat/Vulnerability Analyst
- System Administrators
- Network Administrator
- Network Engineer
CCSP is ideal for professionals working in cyber security domain.CCSP participants usually caters to any of the following job roles.
- Network Architects
- Security Consultants
- Security Architects
- Security Auditors
- Security Managers
- CIOs
- Directory of Security
- Security Analysts
- Security Systems Engineers
Anybody who wants to gain knowledge of globally-recognized CCSP information security standards
Anybody who is looking to clear their CCSP Certification Exam
CEH Fee Per Participant is INR 20000 + 18 %GST.Discount Prices are available on first come first serve basis.For any of the female participants we offer a straight 10% discount in pricing.
Frequently Asked Questions
In order to be considered for the credential, candidates need to have at least two years of work experience in the information security domain. To prove knowledge, they can attend an official EC-Council training either at an accredited training center or at an approved academic institution. As an alternative, candidates can go through an eligibility application process that entails the payment of a non-refundable $100 fee and the submission of a form. If the application is approved, the candidate has three months to purchase the test voucher from EC-Council online store or one of their authorized channels.
The CEH was the first certification to bring “black hat” hacking techniques to a mainstream audience of IT professionals thereby providing the knowledge needed to properly prevent and respond to cyber criminal techniques.Because of the popularity of this certification, thousands of professionals across the world are aiming to achieve it. If you are considering the CEH too, you will want to know the benefits before you invest your time and money.CEH teaches you the offensive hacking skills but from a ethical hacker’s mindset and thus by understanding the attacker’s mindset you are poised to help your organization by providing the required security recommendations for improving the organization’s security posture.
CEH exam is an intermediate level exam and provides extensive coverage of the subject matter of ethical hacking.Passing score for CEH exam is 70%.CEH exam can be considered to be of moderate level of difficulty and with the right approach and preparation a CEH aspirant can pass the exam with flying colours.
CEH exam is conducted in English language and it is a computer based test and the exam duration is 240 minutes and the exam pattern is based on multiple choice answers for every exam question.There are a total of approximately 125 questions tested in the CEH exam.CEH computer based exam is conducted at Pearson Vue assigned testing centres worldwide.For experienced professionals who are pursuing CEH exam without taking training need to pay an application fees of 100 USD.Cost of an EC-Council exam voucher is 950 USD.
KeyTrace Cyber Assurance helps participants by conducting live training sessions over Zoom and other available video communications software.KeyTrace also helps participants by conducting pre and post assessment questions at the end of each chapter.This keeps the audience engaged during the training sessions.As a part of our commitment we also regularly conduct complementary workshops post completion of training programs to further help our participants crack the CEH exam.Practice exam question sets are also provided to participants to help them crack the CEH certification.
CEH Syllabus
Domain 1 : Introduction To Ethical Hacking
- Overview of Current Security Trends
- Understanding Elements of Information Security
- Understanding Information Security Threats and Attack Vectors
- Overview of hacking concepts, types, and phases
- Understanding ethical hacking concepts and scope
- Overview of information security management and defense-in-depth
- Overview of policies, procedures, and awareness
- Overview of physical security and controls
- Understanding incidence management process
- Overview of vulnerability assessment and penetration testing
- Overview of information security acts and laws
Domain 2 : Footprinting And Reconnaissance
- Understanding footprinting concepts
- Footprinting through search engines
- Footprint using advance google hacking techniques
- Footprint through social networking sites
- Understanding different techniques for website footprinting
- Understanding different techniques for email footprinting
- Understanding different techniques of competitive intelligence
- Understanding different techniques for WHO IS footprinting
- Understanding different techniques for network footprinting
- Understanding different techniques of footprinting through social engineering
- Footprinting tools
- Footprinting countermeasures
- Overview of footprinting Pen Testing
Domain 3 : Scanning Networks
- Overview of networking scanning
- Understanding different techniques to check for Live Systems
- Understanding different techniques to check for Open Ports
- Understanding various scanning techniques
- Understanding various IDS Evasion Techniques
- Understanding banner grabbing
- Overview of Vulnerability scanning
- Drawing network diagrams
- Using Proxies and Anonymizer for attack
- Understanding IP Spoofing and various detection techniques
- Overview of scanning and Pen Testing
Domain 4 : Enumeration
- Enumeration
- Understanding different techniques for NetBIOS Enumeration
- Understanding different techniques for SNMP enumeration
- Understanding different techniques for LDAP enumeration
- Understanding different techniques for NTP enumeration
- Understanding different techniques for SMTP and DNS enumeration countermeasures
- Overview of enumeration pen testing
Domain 5 : Vulnerability Analysis
- Vulnerability of the management life cycle
- Understanding various approaches to vulnerability analysis
- Tools used to perform the vulnerability assessments
- Vulnerability analysis tools and techniques
Domain 6 : System Hacking
- Overview of CEH Hacking Methodology
- Understanding different techniques to gain access to the system
- Understanding privilege escalation techniques
- Understanding different techniques to create and maintain remote access to the system
- Overview of different types of Rootkits
- Overview of Steganograpy and Steganalysis
- Understanding techniques to hide the evidence of compromise
- Overview of system hacking penetration testing
Domain 7 : Malware Threats
- Introduction to malware and malware propagation techniques
- Overview of Trojans, their types, and how to infect systems
- Overview of viruses, their types, and how they infect files
- Introduction to computer worm
- Understanding the Malware Analysis Process
- Understanding different techniques to detect malware
- Malware countermeasures
- Overview of Malware penetration testing
Domain 8 : Sniffing
- Overview of sniffing concepts
- Understanding MAC attacks
- Understanding DHCP attacks
- Understanding ARP Poisoning
- Understanding MAC Spoofing attacks
- Understanding DNS poisoning
- Sniffing tools
- Sniffing countermeasures
- Understanding various techniques to detect sniffing
- Overview of sniffing Pen Testing
5>Domain 9 : Social Engineering
- Overview of social engineering
- Understanding various social engineering techniques
- Understanding insider threats
- Understanding impersonation on social networking sites
- Understanding identity theft
- Social engineering countermeasures
- Identify theft countermeasures
- Overview of Social Engineering Pen Testing
Domain 10 : Denial-Of-Service
- Overview of Denial of Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
- Overview different DoS/DDoS) attack techniques
- Understanding the botnet network
- Understanding various DoS and DDoS Attack Tools
- DoS/DDoS Countermeasures
- Overview of DoS Attack Penetration Testing
Domain 11 : Session Hijacking
- Understanding session hijacking concepts
- Understanding application level session hijacking
- Understanding network level session hijacking
- Session hijacking tools
- Session hijacking countermeasures
- Overview of session hijacking penetration testing
Domain 12 : Evading IDS, Firewalls, And Honeypots
- Understanding IDS, Firewall, and honeypot concepts
- IDS, Firewall and honeypot solutions
- Understanding different techniques to bypass IDS
- Understanding different techniques to bypass firewalls
- IDS/Firewall evading tools
- Understanding different techniques to detect honeypots
- IDS/Firewall evasion countermeasures
- Overview of IDS and firewall Penetration Testing
Domain 13 : Hacking Web Servers
- Understanding webserver concepts
- Understanding webserver attacks
- Understanding webserver attack methodology
- Webserver attack tools
- Countermeasures against webserver attacks
- Overview of Patch Manageme
- Webserver security tools
- Overview of Webserver penetration testing
Domain 14 : Hacking Web Applications
- Understanding web application concepts
- Understanding web application threats
- Understanding web application hacking methodology
- Web application hacking tools
- Understanding web application countermeasures
- Web application security tools
- Overview of web application penetration testing
Domain 15 : SQL Injection
- Understanding SQL injection concepts
- Understanding various types of SQL injection attacks
- Understanding SQL injection methodology
- SQL injection tools
- Understanding different IDS evasion techniques
- SQL injection countermeasures
- SQL injection detection tools
Domain 16 : Hacking Wireless Networks
- Understanding wireless concepts
- Understanding wireless encryption algorithms
- Understanding wireless threats
- Understanding wireless hacking methodology
- Wireless hacking tools
- Understanding Bluetooth hacking techniques
- Understanding wireless hacking countermeasures
- Wireless security tools
- Overview of wireless penetration testing
Domain 17 : Hacking Mobile Platforms
- Understanding mobile attack platform vectors
- Understanding various android threat and attacks
- Understanding various iOS threats and attacks
- Understanding various Windows Phone OS threats and attacks
- Understanding various blackberry threats and attacks
- Understanding mobile device management (MDM)
- Mobile Security Guidelines and security tools
- Overview of Mobile Penetration Testing
Domain 18 : IOT Hacking
- Understanding IoT concepts
- Cryptography tools
- Understanding various IoT threats and attacks
- Understanding IoT Hacking
- Understanding IoT attacks
- IoT security Tools
Domain 19 : Cloud Computing
- Understanding Cloud Computing Concepts
- Understanding Cloud Computing Threats
- Understanding Cloud Computing Attacks
- Understanding Cloud Computing Security
- Cloud computing Security tools
- Overview of Cloud Penetration testing
Domain 20 : Cryptography
- Understanding Cryptography concepts
- Understanding Cryptography concepts
- Cryptography tools
- Understanding Public Key Infrastructure (PKI)
- Understanding email encryption
- Understanding disk encryption
- Understanding Cryptography attacks
- Cryptanalysis Tools